Intrepid Ibex, the codename for Ubuntu 8.10, has today finally reached the pinnacle, without hesitation. Although the new version of the popular Linux distribution hasn't won any new altitude records, it still brings along a number of interesting features to make life easier for users and
administrators. High among these features are some rejuvenated programs.
Linux company Red Hat has announced the beta release of version 5.3 for Red Hat Enterprise Linux 5 (RHEL) products.more »
News: Tech Tools New products and updatesOct 24, 2008
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job. We thought you might be interested in the following new products and
Citrix has released version 5 of its virtualization solution, XenServer, claiming to have made more than 100 improvements to the product.more »
The battle in the virtualization market enters a new phase: Sun Microsystems released new versions of its virtualization software Sun xVM. And a few days ago Red Hat announced its takeover of Qumranet, makers of the virtualizer KVM. Meanwhile Microsoft and Novell are teaming up to counter with their own Microsoft Hyper-V and Suse Linux Enterprise Server offerings.more »
KVM Kernel-based virtualization with KVMSep 05, 2008
KVM brings the kernel into the virualization game. We’ll explain why the Linux world is so interested in this promising virtualization alternative.more »
U.S. Linux distributor Red Hat has bought the virtual computing solutions vendor Qumranet.more »
The arrival of Ubuntu 8.04 “Hardy Heron” signaled a new era for the whole family of distributions that use Ubuntu as a base. Kubuntu, Edubuntu, Mythbuntu, and other Ubuntu derivatives soon followed with new releases of their own projects.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm